搜索结果: 1-2 共查到“军事学 Identity-based cryptosystem”相关记录2条 . 查询时间(0.155 秒)
Signcryption in Hierarchical Identity Based Cryptosystem
Sherman S.M. Chow Tsz Hon Yuen Lucas C.K. Hui S.M. Yiu
2009/3/27
In many situations we want to enjoy confidentiality, authenticity and non-repudiation
of message simultaneously. One approach to achieve this objective is to "sign-then-encrypt" the
message, or we c...
Group Password-Authenticated Key Exchange from Identity-Based Cryptosystem
Group Password-Authenticated Key Identity-Based Cryptosystem IBS
2008/5/20
Password-authenticated key exchange (PAKE) protocols are
designed to be secure even when the secret key used for authentication
is a human-memorable password. In this paper, we consider PAKE protoc...